This document is intended to be a primer on how to get IPsec on FreeBSD up and running, interoperating both with another FreeBSD (or NetBSD or any other KAME-derived stack) machine, and a Windows 2000 machine.

Black hats use 'passive fingerprinting' to identify your operating system without you knowing it. But the technique is useful for white hats too. This article discusses those techniques used by Blakc/White hats and how you can prevent them.

The first but secondary purpose of this article is to introduce you this nifty networking tool: /usr/bin/netcat which is well available from the Debian GNU/Linux under the package name netcat. (The drill: apt-get install netcat and you're done.) Ther

Source: "How to break out of a chroot() jail" - Posted byAdministrator

This page details how the chroot() system call can be used to provide an additional layer of security when running untrusted programs. It also details how this additional layer of security can be circumvented.

This documentation discusses the features and security concerns of Sudo (superuser do). Sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while logging the